@article{20447,
  author       = {{Massmann, Melina and Meyer, Maurice and Frank, Maximilian and von Enzberg, Sebastian and Kühn, Arno and Dumitrescu, Roman}},
  journal      = {{Procedia CIRP}},
  number       = {{93}},
  pages        = {{234--239}},
  title        = {{{Method for data inventory and classification}}},
  year         = {{2020}},
}

@article{20448,
  author       = {{Meyer, Maurice and Frank, Maximilian and Massmann, Melina and Wendt, Niklas and Dumitrescu, Roman}},
  journal      = {{Procedia CIRP}},
  number       = {{93}},
  pages        = {{965--970}},
  title        = {{{Data-Driven Product Generation and Retrofit Planning}}},
  year         = {{2020}},
}

@article{20449,
  author       = {{Uhlmann, Eckart and Dumitrescu, Roman and Polte, Julian and Meyer, Maurice and Simsek, Deniz}},
  journal      = {{ wt Werkstattstechnik online }},
  number       = {{07-08}},
  pages        = {{532--535}},
  title        = {{{Datengetriebene Steigerung der Verfügbarkeit}}},
  volume       = {{110}},
  year         = {{2020}},
}

@article{20450,
  author       = {{Massmann, Melina and Meyer, Maurice and Frank, Maximilian and von Enzberg, Sebastian and Kühn, Arno and Dumitrescu, Roman}},
  journal      = {{Procedia Manufacturing}},
  title        = {{{Framework for Data Analytics in Data-Driven Product Planning}}},
  year         = {{2020}},
}

@inproceedings{20452,
  abstract     = {{In this paper, we present a novel approach to design teaching interventions for computing education, elaborated using an example of cybersecurity education. Cybersecurity education, similar to other computing education domains, often focuses on one aspect and separate themselves from the other approach. In other words, they focus on one of the two different aspects: a) either teaching how to use and to behave, or b) how technology works. Here we suggest another point of focal awareness for teaching – interaction – that allows the recombination of both approaches in a novel way, leading to a reconstruction of the teaching and learning content in a way that – as we hope – supports an understanding on a higher level and thus gives the chance to better develop agency. For this didactic reconstruction of teaching content, we use an approach called the hybrid interaction system framework.
In cybersecurity training, teaching interventions oftentimes are in a way successful but seem to not lead to long-lasting changes towards secure behavior. Using simply password security as an example, we show how this new approach recombines the two different priory mentioned teaching approaches in a novel way.
Within this short paper, we present our current research progress, discuss potentials and values of the approach in general, and by way of example. Our intention of this submission and early disclosure is to spark discussion and generate further insights especially regarding the following question: What implications does the hybrid interaction system approach have on learning scenarios?}},
  author       = {{Terfloth, Lutz and Budde, Lea and Schulte, Carsten}},
  isbn         = {{9781450389211}},
  publisher    = {{Association for Computing Machinery}},
  title        = {{{Combining Ideas and Artifacts: An Interaction-Focused View on Computing Education Using a Cybersecurity Example}}},
  doi          = {{10.1145/3428029.3428052}},
  year         = {{2020}},
}

@article{20457,
  author       = {{Gebel, A and Lehmann, T and Granacher, U}},
  issn         = {{0014-4819}},
  journal      = {{Exp Brain Res}},
  number       = {{5}},
  pages        = {{1323--1333}},
  title        = {{{Balance task difficulty affects postural sway and cortical activity in healthy adolescents.}}},
  doi          = {{10.1007/s00221-020-05810-1}},
  volume       = {{238}},
  year         = {{2020}},
}

@article{20469,
  author       = {{Tischer, T and Bode, G and Buhs, M and Marquass, B and Nehrer, S and Vogt, S and Zinser, W and Angele, P and Spahn, G and Welsch, GH and Niemeyer, P and Madry, H}},
  issn         = {{2197-1153}},
  journal      = {{J Exp Orthop}},
  number       = {{1}},
  pages        = {{64}},
  title        = {{{Platelet-rich plasma (PRP) as therapy for cartilage, tendon and muscle damage - German working group position statement.}}},
  doi          = {{10.1186/s40634-020-00282-2}},
  volume       = {{7}},
  year         = {{2020}},
}

@article{20490,
  author       = {{Anders, P and Müller, H and Skjæret-Maroni, N and Vereijken, B and Baumeister, Jochen}},
  journal      = {{Medical & Biological Engineering & Computing}},
  pages        = {{2673--2683}},
  title        = {{{The influence of motor tasks and cut-off parameter selection on artifact subspace reconstruction in EEG recordings}}},
  volume       = {{85}},
  year         = {{2020}},
}

@misc{20495,
  author       = {{Jochmaring, Moritz}},
  title        = {{{A self stabilizing protocol for well-formed trees in hybrid networks}}},
  year         = {{2020}},
}

@article{20496,
  author       = {{Streiter, Martin and Fischer, Tillmann G. and Wiebeler, Christian and Reichert, Sebastian and Langenickel, Jörn and Zeitler, Kirsten and Deibel, Carsten}},
  issn         = {{1932-7447}},
  journal      = {{The Journal of Physical Chemistry C}},
  keywords     = {{pc2-ressources}},
  pages        = {{15007--15014}},
  title        = {{{Impact of Chlorine on the Internal Transition Rates and Excited States of the Thermally Delayed Activated Fluorescence Molecule 3CzClIPN}}},
  doi          = {{10.1021/acs.jpcc.0c03341}},
  year         = {{2020}},
}

@article{20501,
  author       = {{Rosenthal, Marta and Lindner, Jörg K N  and Gerstmann, Uwe and Meier, Armin and Schmidt, W Gero and Wilhelm, René}},
  journal      = {{Royal Society of Chemistry }},
  number       = {{42930-42937}},
  title        = {{{A photoredox catalysed Heck reaction via hole transfer from a Ru(II)-bis(terpyridine) complex to graphene oxide }}},
  doi          = {{10.1039/d0ra08749a}},
  volume       = {{10}},
  year         = {{2020}},
}

@article{20507,
  author       = {{Geismann, Johannes and Bodden, Eric}},
  issn         = {{0164-1212}},
  journal      = {{Journal of Systems and Software}},
  pages        = {{110697}},
  title        = {{{A systematic literature review of model-driven security engineering for cyber–physical systems}}},
  doi          = {{https://doi.org/10.1016/j.jss.2020.110697}},
  volume       = {{169}},
  year         = {{2020}},
}

@inproceedings{20509,
  author       = {{Fischer, Andreas and Janneck, Jonas and Kussmaul, Jörn and Krätzschmar, Nikolas and Kerschbaum, Florian and Bodden, Eric}},
  booktitle    = {{2020 IEEE Computer Security Foundations Symposium (CSF)}},
  title        = {{{PASAPTO: Policy-aware Security and Performance Trade-off Analysis - Computation on Encrypted Data with Restricted Leakage}}},
  year         = {{2020}},
}

@inproceedings{20511,
  author       = {{Fischer, Andreas and Fuhry, Benny and Kerschbaum, Florian and Bodden, Eric}},
  booktitle    = {{Privacy Enhancing Technologies Symposium (PETS/PoPETS)}},
  title        = {{{Computation on Encrypted Data using Dataflow Authentication}}},
  year         = {{2020}},
}

@inproceedings{20512,
  author       = {{Krüger, Stefan and Ali, Karim and Bodden, Eric}},
  booktitle    = {{International Symposium on Code Generation and Optimization (CGO)}},
  pages        = {{185--198}},
  title        = {{{CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs}}},
  year         = {{2020}},
}

@phdthesis{20513,
  abstract     = {{Frühere Studien haben empirisch offenbart, dass Fehlbenutzungen von kryptographischen APIs in Softwareanwendungen weitverbreitet sind. Dies geschieht vor allem, weil Software-Entwickler_innen aufgrund schlechten API-Designs und fehlenden Kryptographiewissens Probleme bekommen, wenn sie versuchen kryptographische Features zu implementieren. Die Literatur liefert mehrere Ansätze und Vorschläge diese Probleme zu lösen, aber alle scheitern schlussendlich auf die eine oder andere Weise daran die Anforderungen der Entwickler_innenzu erfüllen. Das Resultat ist eine insgesamt lückenhafte Landschaft verschiedener nur wenigkomplementärer Ansätze.In dieser Arbeit adressieren wir das Problem kryptographischer Fehlbenutzungen systematischer durch CogniCrypt. CogniCrypt integriert verschiedene Arten von Tool Supportin einen gemeinsamen Ansatz, der Entwickler_innen davon befreit wissen zu müssen, wie diese APIs benutzt werden müssen. Zentral für unseren Ansatz ist CrySL, eine Beschreibungssprache,die die kognitive Lücke zwischen Kryptographie-Expert_innen und Software-Entwickler_innenüberbrückt. CrySL ermöglicht es Kryptographie-Expert_innen zu spezifizeren, wie die APIs,die sie bereitstellen, richtig benutzt werden. Wir haben einen Compiler für CrySL implementiert, der es erlaubt auf CrySL-Spezifikationen aufbauenden Tool Support zu entwickeln. Wir haben weiterhin die statische Analyse CogniCrypt_SAST und den Code-Generator CogniCrypt_GEN entwickelt. Schlussendlich haben wir CogniCrypt prototypisch implementiert und diesen Prototyp in einem kontrollierten Experiment evaluiert.
}},
  author       = {{Krüger, Stefan}},
  publisher    = {{Universitaetsbibliothek Paderborn}},
  title        = {{{CogniCrypt -- The Secure Integration of Cryptographic Software}}},
  year         = {{2020}},
}

@inproceedings{20514,
  author       = {{Yigitbas, Enes}},
  booktitle    = {{ACM SIGWEB Newsletter}},
  publisher    = {{ACM}},
  title        = {{{Model-driven engineering and usability evaluation of self-adaptive user interfaces}}},
  doi          = {{https://doi.org/10.1145/3427478.3427480}},
  year         = {{2020}},
}

@inproceedings{20516,
  abstract     = {{Traceability, a classic requirements engineering topic, is increasingly used in the context of model-based engineering. However, researchers and practitioners lack a concise terminology to discuss aspects of requirements traceability in situations in which engineers heavily rely on models and model-based engineering. While others have previously surveyed the domain, no one has so far provided a clear, unambiguous set of terms that can be used to discuss traceability in such a context. We therefore set out to cut a path through the jungle of terminology for model-based traceability, ground it in established terminology from requirements engineering, and derive an unambiguous set of relevant terms. We also map the terminology used in existing primary and secondary studies to our taxonomy to show differences and commonalities. The contribution of this paper is thus a terminology for model-based traceability that allows requirements engineers and engineers working with models to unambiguously discuss their joint traceability efforts.}},
  author       = {{Holtmann, Jörg and Steghofer, Jan-Philipp and Rath, Michael and Schmelter, David}},
  booktitle    = {{2020 IEEE 28th International Requirements Engineering Conference (RE)}},
  isbn         = {{9781728174389}},
  publisher    = {{IEEE}},
  title        = {{{Cutting through the Jungle: Disambiguating Model-based Traceability Terminology}}},
  doi          = {{10.1109/re48521.2020.00014}},
  year         = {{2020}},
}

@inproceedings{20518,
  author       = {{Koch, Thorsten and Dziwok, Stefan and Holtmann, Jörg and Bodden, Eric}},
  booktitle    = {{ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems (MODELS ’20)}},
  publisher    = {{ACM}},
  title        = {{{Scenario-based Specification of Security Protocols and Transformation to Security Model Checkers}}},
  doi          = {{10.1145/3365438.3410946}},
  year         = {{2020}},
}

@phdthesis{20521,
  author       = {{Gerking, Christopher}},
  publisher    = {{Paderborn University}},
  title        = {{{Model-Driven Information Flow Security Engineering for Cyber-Physical Systems}}},
  doi          = {{10.17619/UNIPB/1-1033}},
  year         = {{2020}},
}

